{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:54:29Z","timestamp":1773482069714,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100005825","name":"National Institute of Food and Agriculture","doi-asserted-by":"publisher","award":["2021-67021-34252"],"award-info":[{"award-number":["2021-67021-34252"]}],"id":[{"id":"10.13039\/100005825","id-type":"DOI","asserted-by":"publisher"}]},{"name":"United States Department of Agriculture"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS1846316"],"award-info":[{"award-number":["CNS1846316"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF","award":["Cyber Physical Systems"],"award-info":[{"award-number":["Cyber Physical Systems"]}]},{"name":"Army Research Lab","award":["W911NF-2020-221"],"award-info":[{"award-number":["W911NF-2020-221"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,27]]},"DOI":"10.1145\/3590140.3592848","type":"proceedings-article","created":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T18:06:33Z","timestamp":1700849193000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["EESMR"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4099-4014","authenticated-orcid":false,"given":"Adithya","family":"Bhat","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9669-5788","authenticated-orcid":false,"given":"Akhil","family":"Bandarupalli","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2032-9175","authenticated-orcid":false,"given":"Manish","family":"Nagaraj","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4239-5632","authenticated-orcid":false,"given":"Saurabh","family":"Bagchi","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2246-8416","authenticated-orcid":false,"given":"Aniket","family":"Kate","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7007-8274","authenticated-orcid":false,"given":"Michael K.","family":"Reiter","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA and Chainlink Labs"}]}],"member":"320","published-online":{"date-parts":[[2023,11,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. A Byzantine Failure in the Real World. http:\/\/blog.cloudflare.com\/a-byzantine-failure-in-the-real-world\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2021. IBM Documentation. https:\/\/prod.ibmdocs-production-dal-6099123ce774e592a519d7c33db8265e-0000.us-south.containers.appdomain.cloud\/docs\/en\/zos\/2.3.0?topic=certificates-size-considerations-public-private-keys"},{"key":"e_1_3_2_1_3_1","unstructured":"2022. README for Mbed TLS. Mbed TLS. https:\/\/github.com\/Mbed-TLS\/mbedtls"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Ittai Abraham Srinivas Devadas Danny Dolev Kartik Nayak and Ling Ren. 2019. Synchronous Byzantine Agreement with Expected O(1) Rounds Expected O(N2) Communication and Optimal Resilience. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Goldberg Ian and Tyler and Moore (Eds.). Vol. 11598 LNCS. Springer International Publishing Cham 320--334. https:\/\/doi.org\/10.1007\/978-3-030-32101-7_20","DOI":"10.1007\/978-3-030-32101-7_20"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Ittai Abraham and Danny Dolev. 2015. Byzantine Agreement with Optimal Early Stopping Optimal Resilience and Polynomial Complexity. arXiv:arXiv:1504.02547 http:\/\/arxiv.org\/abs\/1504.02547 Comment: full version of STOC 2015 abstract.","DOI":"10.1145\/2746539.2746581"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00044"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467899"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.OPODIS.2021.27"},{"key":"e_1_3_2_1_9_1","volume-title":"Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast. Cryptology ePrint Archive","author":"Abraham Ittai","year":"2020","unstructured":"Ittai Abraham, Benny Pinkas, and Avishay Yanai. 2020. Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast. Cryptology ePrint Archive (2020). https:\/\/eprint.iacr.org\/2020\/248"},{"key":"e_1_3_2_1_10_1","volume-title":"Information Theoretic HotStuff. arXiv preprint arXiv:2009.12828","author":"Abraham Ittai","year":"2020","unstructured":"Ittai Abraham and Gilad Stern. 2020. Information Theoretic HotStuff. arXiv preprint arXiv:2009.12828 (2020). arXiv:2009.12828"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87779-0_2"},{"key":"e_1_3_2_1_12_1","volume-title":"Succinct Erasure Coding Proof Systems. Cryptology ePrint Archive","author":"Alhaddad Nicolas","year":"2021","unstructured":"Nicolas Alhaddad, Sisi Duan, Mayank Varia, and Haibin Zhang. 2021. Succinct Erasure Coding Proof Systems. Cryptology ePrint Archive (2021). https:\/\/eprint.iacr.org\/2021\/1500"},{"key":"e_1_3_2_1_13_1","unstructured":"Renas Bacho Daniel Collins Chen-Da Liu-Zhang and Julian Loss. 2022. Network-Agnostic Security Comes for Free in DKG and MPC. https:\/\/eprint.iacr.org\/2022\/1369"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_24"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.43"},{"key":"e_1_3_2_1_16_1","volume-title":"Reiter","author":"Bhat Adithya","year":"2023","unstructured":"Adithya Bhat, Akhil Bandarupalli, Manish Nagaraj, Saurabh Bagchi, Aniket Kate, and Micheal K. Reiter. 2023. EESMR: Energy Efficient BFT-SMR for the masses. arXiv:2304.04998 [cs.CR]"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2981415"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9005-7"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/4221.214134"},{"key":"e_1_3_2_1_20_1","volume-title":"The Latest Gossip on BFT Consensus. (Nov","author":"Buchman Ethan","year":"2019","unstructured":"Ethan Buchman, Jae Kwon, and Zarko Milosevic. 2019. The Latest Gossip on BFT Consensus. (Nov. 2019), 1--14. arXiv:1807.04938 http:\/\/arxiv.org\/abs\/1807.04938"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2014.28"},{"key":"e_1_3_2_1_23_1","unstructured":"T-H Hubert Chan Rafael Pass and Elaine Shi. 2018. PaLa: A Simple Partially Synchronous Blockchain 21 pages. https:\/\/eprint.iacr.org\/2018\/981"},{"key":"e_1_3_2_1_24_1","unstructured":"T.-H. Hubert Chan Rafael Pass and Elaine Shi. 2018. PiLi: An Extremely Simple Synchronous Blockchain. https:\/\/eprint.iacr.org\/2018\/980"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3036087"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3464768"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0308-x"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/357830.357847"},{"key":"e_1_3_2_1_29_1","volume-title":"Asynchronous Data Dissemination and Its Applications. Cryptology ePrint Archive","author":"Das Sourav","year":"2021","unstructured":"Sourav Das, Zhuolun Xiang, and Ling Ren. 2021. Asynchronous Data Dissemination and Its Applications. Cryptology ePrint Archive (2021). https:\/\/eprint.iacr.org\/2021\/777"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519568"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2711484"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1137\/0212045"},{"key":"e_1_3_2_1_33_1","volume-title":"Byzantine Reliable Broadcast with O(nL+kn+n2 Log n) Communication. Cryptology ePrint Archive","author":"Duan Sisi","year":"2022","unstructured":"Sisi Duan and Haibin Zhang. 2022. Byzantine Reliable Broadcast with O(nL+kn+n2 Log n) Communication. Cryptology ePrint Archive (2022). https:\/\/eprint.iacr.org\/2022\/554"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.3390\/su12219179"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 10th ACM\/IEEE International Conference on Information Processing in Sensor Networks. 73--84","author":"Ferrari Federico","year":"2011","unstructured":"Federico Ferrari, Marco Zimmerling, Lothar Thiele, and Olga Saukh. 2011. Efficient Network Flooding and Time Synchronization with Glossy. In Proceedings of the 10th ACM\/IEEE International Conference on Information Processing in Sensor Networks. 73--84."},{"key":"e_1_3_2_1_36_1","unstructured":"NIST Fips. 1994. 186 Digital Signature Standard."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335363"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00063"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.006"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307658"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3009228"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168866"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331619"},{"key":"e_1_3_2_1_46_1","unstructured":"Thorsten Kleinjung Kazumaro Aoki Jens Franke Arjen K Lenstra Emmanuel Thom\u00e9 Joppe W Bos Pierrick Gaudry Alexander Kruppa Peter L Montgomery Dag Arne Osvik Andrey Timofeev and Paul Zimmermann. [n. d.]. Factorization of a 768-Bit RSA Modulus. ([n.d.]) 18."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1011767.1011807"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294267"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2906157"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","unstructured":"Johannes Merkle and Manfred Lochter. 2010. Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation. Request for Comments RFC 5639. Internet Engineering Task Force. https:\/\/doi.org\/10.17487\/RFC5639","DOI":"10.17487\/RFC5639"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","unstructured":"Henrique Moniz. 2020. The Istanbul BFT Consensus Algorithm. https:\/\/doi.org\/10.48550\/arXiv.2002.03613 arXiv:arXiv:2002.03613","DOI":"10.48550\/arXiv.2002.03613"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424835"},{"key":"e_1_3_2_1_54_1","volume-title":"Threats to Precision Agriculture. (July","author":"Mutschler Pete","year":"2018","unstructured":"Pete Mutschler. 2018. Threats to Precision Agriculture. (July 2018). https:\/\/policycommons.net\/artifacts\/1571846\/threats-to-precision-agriculture\/2261625\/"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.DISC.2020.28"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2879679"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN44214.2019.8990728"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00025"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2017.11"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN48667.2020.9314805"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2009.2019335"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417284"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2003.1200555"},{"key":"e_1_3_2_1_65_1","first-page":"169","article-title":"Zeno: Eventually Consistent Byzantine-Fault Tolerance","volume":"9","author":"Singh Atul","year":"2009","unstructured":"Atul Singh, Pedro Fonseca, Petr Kuznetsov, Rodrigo Rodrigues, and Petros Maniatis. 2009. Zeno: Eventually Consistent Byzantine-Fault Tolerance.. In NSDI, Vol. 9. 169--184.","journal-title":"NSDI"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.016"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1026799.1026821"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180439"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70569-9"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.221"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2012.6152242"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570740"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2014.01.005"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1802-3"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.OPODIS.2022.24"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD50377.2020.00023"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2924054"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3014864"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410159"}],"event":{"name":"Middleware '23: 24th International Middleware Conference","location":"Bologna Italy","acronym":"Middleware '23","sponsor":["ACM Association for Computing Machinery","IFIP International Federation for Information Processing"]},"container-title":["Proceedings of the 24th International Middleware Conference on ZZZ"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3592848","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3590140.3592848","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590140.3592848","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590140.3592848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T16:52:33Z","timestamp":1756486353000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3592848"}},"subtitle":["Energy Efficient BFT---SMR for the masses"],"short-title":[],"issued":{"date-parts":[[2023,11,27]]},"references-count":80,"alternative-id":["10.1145\/3590140.3592848","10.1145\/3590140"],"URL":"https:\/\/doi.org\/10.1145\/3590140.3592848","relation":{},"subject":[],"published":{"date-parts":[[2023,11,27]]},"assertion":[{"value":"2023-11-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}